SlideShare una empresa de Scribd logo
1 de 20
Trusted Launch
of Generic Virtual Machine Images
    in Public IaaS Environments

  Nicolae Paladi1*, Christian Gehrmann1,
   Mudassar Aslam1, Fredric Morenius2




     1
         Swedish Institute of Computer Science
                  2
                    Ericsson Research
2



Contents


           1. Infrastructure-as-a-Service
           2. Problem Setting
           3. Attacker Model
           4. Related Work
           5. Protocol Description
           6. Protocol Implementation
           7. Conclusion



                                                              -
                                                         u re
                                                          ct
                                                        ru -
                                                      st a
                                                   fra as- vice
                                                In           r
                                                          Se
3



Infrastructure-as-a-Service
• A 'cloud computing' service model (NIST:2011):



    Provision processing, storage, networks.

    Deploy and run arbitrary software

    No control over underlying cloud infrastructure

    Control over OS, storage, deployed applications.

    Limited control of select networking components.

                                                                 rio
                                                             e na d      s
                                                           Sc an tion
                                                                       i
                                                                    in
                                                                def
4



Scenario and Definitions
                     Scheduler
                        (S)




                  Compute         Compute     Compute
                    Host            Host        Host
                    (CH)            (CH)        (CH)



                 Hardware        Hardware   Hardware
Client (C)                                              f
                                                     rie te
                                                    B o M
                                                      N TP
                                                       on
5


    A Brief Note on TPM
•
   Trusted platform module v1.2 as specified by TCG
•
   v2.0 is currently under review
•
   Tamper-evident
•
  16+ PCRs as volatile or non-volatile storage
Four operations: Signing / Binding / Sealing / Sealed-sign




                                                                   em
                                                               o bl ng
                                                             Pr etti
                                                                S
6


Problem Setting

• “Consumer is able to deploy and run arbitrary software, which can
    include operating systems and applications.”

•
    Client can launch VMs for sensitive computations.

•
    Trusted VM launch – the correct VM is launched in a IaaS
    platform on a host with a known software stack verified to not
    have been modified by malicious actors.

•
    How do we ensure a trusted VM launch in an untrusted
    IaaS environment?
                                                                              er
                                                                        ta c k el
                                                                      At od
                                                                          M
7


Attacker Model


•   (Ar) has root access to IaaS hosts.


•   (Ar) has no physical access.


•   (Ar) has no access to CH's memory.


•   (Ar) can act maliciously or in good faith.
                                                            ck
                                                         tta ario
                                                        A n
                                                            e
                                                         Sc 1
•   (A ) can be a person/malicious software/code bug.
8



Attack scenario 1
                                          Remote Attacker
                       Scheduler
                                                Ar
                          (S)




                    Trusted
                    Compute         Compute
                      Host            Host
                     (CH)             (CH)



                Hardware           Hardware   Hardware
Client (C)                                                ck
                                                       tta ario
                                                      A n
                                                          e
                                                       Sc 2
9



Attack scenario 2
                                  Remote Attacker
                                        Ar




                            Compute     Compute
                              Host        Host
                              (CH)        (CH)



                Hardware   Hardware   Hardware
Client (C)                                          ed
                                                 lat rk
                                               Re o
                                                  W
10


Related Work




                           d
                      u ste d
                    Tr hir ty
                       T ar
                           P
11


Trusted VM Launch Protocol:
Trusted Third Party
•
    Trusted Third Party (TTP) – trusted by C and IaaS, able
    to assess the SP of CH according to predefined guidelines.

•
    Security profile (SP) – verified setup of an VM, trusted by
    the Participants.

•
    Currently no fine-grained scale of SP available.

•
    Limited to only matching the measurements with
    reference values.
                                                                    g
                                                                 Bi e
                                                                e r
                                                              Th ictu
                                                                P
The big picture
                    3.
                               (S)


   1.
                                     4.
                                          5.

         2.
               CH         CH         CH
                                               6.

                                HW
              HW         HW      +
                                TPM                         l
Client (C)                                               c o ion
                                                       to t
                                                     ro crip
                                                    P s 1)
                                                       e (
                                                     D
13


Trusted VM Launch Protocol:
Protocol Details (1)




                                           l
                                        c o ion
                                      to t
                                    ro crip
                                   P s 2)
                                      e (
                                    D
14


Trusted VM Launch Protocol:
Protocol Details (2)




                                          l
                                        co ion
                                      to t
                                    ro rip
                                   P sc 3)
                                      e (
                                    D
15


Trusted VM Launch Protocol:
Protocol Details (3)




                                           l
                                        c o ion
                                      to t
                                    ro crip
                                   P s 4)
                                      e (
                                    D
16


Trusted VM Launch Protocol:
Protocol Details (4)




                                                   k
                                             S tac
                                         n
                                    pe
                                   O
18


Trusted VM Launch Protocol:
OpenStack
•
    Protocol was implemented in OpenStack
•
    Open Source IaaS deployment and management
    platform.
•
    Large user base and multiple industry contributors
•
    “Essex” release as baseline.
•
    Aimed to have a minimal footprint in terms of code
    modifications.
•
  Implementation changed 4 components
involved in the launch process (presented next).                   l n
                                                                 co atio
                                                               to t
                                                            r o en
                                                           P m )
                                                               e
                                                             pl (1
                                                         Im
19


Trusted VM Launch Protocol:
Protocol Implementation (1)
Affected components:

•
    Nova SQL db – global security profile per compute host.

•
 Dashboard – request compute host attestation, minimum
SP, TTP’s URL and Token upload.

•
 Scheduler – SimpleScheduler to schedule VM launches on
trusted CH with the requested–or stricter–SP.

•
 Nova compute – support communication with TPM through
TSS, encryption/decryption and VM image integrity
assessment.                                                              l        n
                                                                       co tatio
                                                                    to
                                                                 ro en
                                                                P e m 2)
                                                                  pl (
                                                               Im
20


Trusted VM Launch Protocol:
Protocol Implementation (2)
•
    TrustedComputingPools (currently in blueprints)
    will introduce TPM support in OpenStack

•
    Trusted IaaS provider with untrusted nodes.

•
    Node attestation offered as “premium service”.

•
    Node attestation performed by IaaS provider itself.

                                                                            n
                                                                      u si o
                                                             n   cl
                                                          Co
21



Conclusion
•
    A trusted VM launch protocol available assuming
    an untrusted IaaS platform + TPM + physical
    security of the hosts.

•
    Fairly close to ongoing industrial implementation
    but offers stricter security guarantees.

•
    Fine-grained attestation process on the TTP side
    still a research challenge.

Más contenido relacionado

La actualidad más candente

深入淺出C語言
深入淺出C語言深入淺出C語言
深入淺出C語言Simen Li
 
Design and Implementation of 64 Bit RISC Processor Using System.pdf
Design and Implementation of 64 Bit RISC Processor Using System.pdfDesign and Implementation of 64 Bit RISC Processor Using System.pdf
Design and Implementation of 64 Bit RISC Processor Using System.pdfChowdappaKv1
 
Pragmatic optimization in modern programming - modern computer architecture c...
Pragmatic optimization in modern programming - modern computer architecture c...Pragmatic optimization in modern programming - modern computer architecture c...
Pragmatic optimization in modern programming - modern computer architecture c...Marina Kolpakova
 
CMPP 2012 held in conjunction with ICNC’12
CMPP 2012 held in conjunction with ICNC’12CMPP 2012 held in conjunction with ICNC’12
CMPP 2012 held in conjunction with ICNC’12Ryohei Kobayashi
 
A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...
A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...
A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...Shinya Takamaeda-Y
 
gcov和clang中的实现
gcov和clang中的实现gcov和clang中的实现
gcov和clang中的实现Ray Song
 
小型安価なFPGAボードの紹介と任意波形発生器
小型安価なFPGAボードの紹介と任意波形発生器小型安価なFPGAボードの紹介と任意波形発生器
小型安価なFPGAボードの紹介と任意波形発生器uchan_nos
 
A CGRA-based Approach for Accelerating Convolutional Neural Networks
A CGRA-based Approachfor Accelerating Convolutional Neural NetworksA CGRA-based Approachfor Accelerating Convolutional Neural Networks
A CGRA-based Approach for Accelerating Convolutional Neural NetworksShinya Takamaeda-Y
 
Workshop NGS data analysis - 3
Workshop NGS data analysis - 3Workshop NGS data analysis - 3
Workshop NGS data analysis - 3Maté Ongenaert
 
Advanced Components on Top of L4Re
Advanced Components on Top of L4ReAdvanced Components on Top of L4Re
Advanced Components on Top of L4ReVasily Sartakov
 

La actualidad más candente (13)

深入淺出C語言
深入淺出C語言深入淺出C語言
深入淺出C語言
 
Design and Implementation of 64 Bit RISC Processor Using System.pdf
Design and Implementation of 64 Bit RISC Processor Using System.pdfDesign and Implementation of 64 Bit RISC Processor Using System.pdf
Design and Implementation of 64 Bit RISC Processor Using System.pdf
 
Pragmatic optimization in modern programming - modern computer architecture c...
Pragmatic optimization in modern programming - modern computer architecture c...Pragmatic optimization in modern programming - modern computer architecture c...
Pragmatic optimization in modern programming - modern computer architecture c...
 
CMPP 2012 held in conjunction with ICNC’12
CMPP 2012 held in conjunction with ICNC’12CMPP 2012 held in conjunction with ICNC’12
CMPP 2012 held in conjunction with ICNC’12
 
Memory, IPC and L4Re
Memory, IPC and L4ReMemory, IPC and L4Re
Memory, IPC and L4Re
 
Parallel R
Parallel RParallel R
Parallel R
 
A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...
A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...
A Framework for Efficient Rapid Prototyping by Virtually Enlarging FPGA Resou...
 
gcov和clang中的实现
gcov和clang中的实现gcov和clang中的实现
gcov和clang中的实现
 
小型安価なFPGAボードの紹介と任意波形発生器
小型安価なFPGAボードの紹介と任意波形発生器小型安価なFPGAボードの紹介と任意波形発生器
小型安価なFPGAボードの紹介と任意波形発生器
 
Smashing The Stack
Smashing The StackSmashing The Stack
Smashing The Stack
 
A CGRA-based Approach for Accelerating Convolutional Neural Networks
A CGRA-based Approachfor Accelerating Convolutional Neural NetworksA CGRA-based Approachfor Accelerating Convolutional Neural Networks
A CGRA-based Approach for Accelerating Convolutional Neural Networks
 
Workshop NGS data analysis - 3
Workshop NGS data analysis - 3Workshop NGS data analysis - 3
Workshop NGS data analysis - 3
 
Advanced Components on Top of L4Re
Advanced Components on Top of L4ReAdvanced Components on Top of L4Re
Advanced Components on Top of L4Re
 

Destacado

New Pr Ofesy Conference Presentation
New Pr Ofesy Conference PresentationNew Pr Ofesy Conference Presentation
New Pr Ofesy Conference Presentationcjoynson
 
Barker Creek Heirloom Seeds and Rare Seeds
Barker Creek Heirloom Seeds and Rare SeedsBarker Creek Heirloom Seeds and Rare Seeds
Barker Creek Heirloom Seeds and Rare SeedsAliki85w
 
2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration
2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration
2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and ConfigurationMarc Combes
 
2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...
2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...
2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...Marc Combes
 
Lund security workshop_presentation
Lund security workshop_presentationLund security workshop_presentation
Lund security workshop_presentationnpaladi
 
1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie
1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie
1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und StrategieMarc Combes
 
Scroll and key annual appeal 2 nl
Scroll and key annual appeal 2 nlScroll and key annual appeal 2 nl
Scroll and key annual appeal 2 nlKTAssoc
 
Scroll and key annual appeal 1 nl
Scroll and key annual appeal 1 nlScroll and key annual appeal 1 nl
Scroll and key annual appeal 1 nlKTAssoc
 
Central Texas Community Gardening Manual - World Hunger Relief
Central Texas Community Gardening Manual - World Hunger ReliefCentral Texas Community Gardening Manual - World Hunger Relief
Central Texas Community Gardening Manual - World Hunger ReliefAliki85w
 
Custom Android Code Templates
Custom Android Code TemplatesCustom Android Code Templates
Custom Android Code Templatesmurphonic
 
Basic List of Companion Plants - Chico, California
Basic List of Companion Plants - Chico, CaliforniaBasic List of Companion Plants - Chico, California
Basic List of Companion Plants - Chico, CaliforniaAliki85w
 
3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...
3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...
3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...Marc Combes
 
Brand Plan for the launch of Brand-X
Brand Plan for the launch of Brand-XBrand Plan for the launch of Brand-X
Brand Plan for the launch of Brand-XSatyajit Hui
 
Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...
Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...
Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...Aliki85w
 
1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner
1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner
1.3 Kofax Partner Connect 2013 - Investment in Unsere PartnerMarc Combes
 
Alley Cropping in Agro Forestry - University of Missouri
Alley Cropping in Agro Forestry - University of MissouriAlley Cropping in Agro Forestry - University of Missouri
Alley Cropping in Agro Forestry - University of MissouriAliki85w
 
Glenmark analyst ppt
Glenmark analyst pptGlenmark analyst ppt
Glenmark analyst pptKevin Simon
 
Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)
Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)
Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)Eularis
 

Destacado (20)

New Pr Ofesy Conference Presentation
New Pr Ofesy Conference PresentationNew Pr Ofesy Conference Presentation
New Pr Ofesy Conference Presentation
 
Launch phases generic pharma
Launch phases generic pharmaLaunch phases generic pharma
Launch phases generic pharma
 
Barker Creek Heirloom Seeds and Rare Seeds
Barker Creek Heirloom Seeds and Rare SeedsBarker Creek Heirloom Seeds and Rare Seeds
Barker Creek Heirloom Seeds and Rare Seeds
 
2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration
2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration
2.4 Kofax Partner Connect 2013 - Non-Standard Licensing and Configuration
 
2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...
2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...
2.1 Kofax Partner Connect 2013 - Nutzung des Kofax Storyboards - Aus der Pers...
 
Lund security workshop_presentation
Lund security workshop_presentationLund security workshop_presentation
Lund security workshop_presentation
 
1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie
1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie
1.1 Kofax Partner Connect 2013 - Willkommen - Firmenvision und Strategie
 
Scroll and key annual appeal 2 nl
Scroll and key annual appeal 2 nlScroll and key annual appeal 2 nl
Scroll and key annual appeal 2 nl
 
Scroll and key annual appeal 1 nl
Scroll and key annual appeal 1 nlScroll and key annual appeal 1 nl
Scroll and key annual appeal 1 nl
 
Central Texas Community Gardening Manual - World Hunger Relief
Central Texas Community Gardening Manual - World Hunger ReliefCentral Texas Community Gardening Manual - World Hunger Relief
Central Texas Community Gardening Manual - World Hunger Relief
 
Custom Android Code Templates
Custom Android Code TemplatesCustom Android Code Templates
Custom Android Code Templates
 
Basic List of Companion Plants - Chico, California
Basic List of Companion Plants - Chico, CaliforniaBasic List of Companion Plants - Chico, California
Basic List of Companion Plants - Chico, California
 
3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...
3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...
3.2 Kofax Partner Connect 2013 - Transformation Modules - Advanced Track and ...
 
Brand Plan for the launch of Brand-X
Brand Plan for the launch of Brand-XBrand Plan for the launch of Brand-X
Brand Plan for the launch of Brand-X
 
Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...
Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...
Alice Springs Vegie Garden Companion: A Handbook for Growing Food in Arid Aus...
 
1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner
1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner
1.3 Kofax Partner Connect 2013 - Investment in Unsere Partner
 
Alley Cropping in Agro Forestry - University of Missouri
Alley Cropping in Agro Forestry - University of MissouriAlley Cropping in Agro Forestry - University of Missouri
Alley Cropping in Agro Forestry - University of Missouri
 
Glenmark analyst ppt
Glenmark analyst pptGlenmark analyst ppt
Glenmark analyst ppt
 
generic drugs
generic drugs generic drugs
generic drugs
 
Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)
Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)
Pre-Launch Planning: Priming Your Pharma Brand For Profit And Success (mini)
 

Similar a Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments

Me3D: A Model-driven Methodology Expediting Embedded Device Driver Development
Me3D: A Model-driven Methodology  Expediting Embedded Device  Driver DevelopmentMe3D: A Model-driven Methodology  Expediting Embedded Device  Driver Development
Me3D: A Model-driven Methodology Expediting Embedded Device Driver Developmenthuichenphd
 
OpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosOpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosBrent Salisbury
 
Leveraging open source for large scale analytics
Leveraging open source for large scale analyticsLeveraging open source for large scale analytics
Leveraging open source for large scale analyticsSouth West Data Meetup
 
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...Anne Nicolas
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Ramesh Nagappan
 
Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano GiordanoGoWireless
 
Stefano Giordano
Stefano  GiordanoStefano  Giordano
Stefano GiordanoGoWireless
 
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kuniyasu Suzaki
 
Why i need to learn so much math for my phd research
Why i need to learn so much math for my phd researchWhy i need to learn so much math for my phd research
Why i need to learn so much math for my phd researchCrypto Cg
 
Why i need to learn so much math for my phd research
Why i need to learn so much math for my phd researchWhy i need to learn so much math for my phd research
Why i need to learn so much math for my phd researchMarisa Paryasto
 
2015 10-30 面試心得分享
2015 10-30 面試心得分享2015 10-30 面試心得分享
2015 10-30 面試心得分享Hung Liu
 
Software Defined Data Centers - June 2012
Software Defined Data Centers - June 2012Software Defined Data Centers - June 2012
Software Defined Data Centers - June 2012Brent Salisbury
 
Core Scheduling for Virtualization: Where are We? (If we Want it!)
Core Scheduling for Virtualization: Where are We? (If we Want it!)Core Scheduling for Virtualization: Where are We? (If we Want it!)
Core Scheduling for Virtualization: Where are We? (If we Want it!)Dario Faggioli
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptographyShivam Singh
 
MARC ONERA Toulouse2012 Altreonic
MARC ONERA Toulouse2012 AltreonicMARC ONERA Toulouse2012 Altreonic
MARC ONERA Toulouse2012 AltreonicEric Verhulst
 
The trials and tribulations of providing engineering infrastructure
 The trials and tribulations of providing engineering infrastructure  The trials and tribulations of providing engineering infrastructure
The trials and tribulations of providing engineering infrastructure TechExeter
 
Mykhailo Zarai "Be careful when dealing with C++" at Rivne IT Talks
Mykhailo Zarai "Be careful when dealing with C++" at Rivne IT TalksMykhailo Zarai "Be careful when dealing with C++" at Rivne IT Talks
Mykhailo Zarai "Be careful when dealing with C++" at Rivne IT TalksVadym Muliavka
 

Similar a Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments (20)

Me3D: A Model-driven Methodology Expediting Embedded Device Driver Development
Me3D: A Model-driven Methodology  Expediting Embedded Device  Driver DevelopmentMe3D: A Model-driven Methodology  Expediting Embedded Device  Driver Development
Me3D: A Model-driven Methodology Expediting Embedded Device Driver Development
 
OpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosOpenStack and OpenFlow Demos
OpenStack and OpenFlow Demos
 
Leveraging open source for large scale analytics
Leveraging open source for large scale analyticsLeveraging open source for large scale analytics
Leveraging open source for large scale analytics
 
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano Giordano
 
Stefano Giordano
Stefano  GiordanoStefano  Giordano
Stefano Giordano
 
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
 
c-quilibrium R forecasting integration
c-quilibrium R forecasting integrationc-quilibrium R forecasting integration
c-quilibrium R forecasting integration
 
Why i need to learn so much math for my phd research
Why i need to learn so much math for my phd researchWhy i need to learn so much math for my phd research
Why i need to learn so much math for my phd research
 
Why i need to learn so much math for my phd research
Why i need to learn so much math for my phd researchWhy i need to learn so much math for my phd research
Why i need to learn so much math for my phd research
 
2015 10-30 面試心得分享
2015 10-30 面試心得分享2015 10-30 面試心得分享
2015 10-30 面試心得分享
 
Software Defined Data Centers - June 2012
Software Defined Data Centers - June 2012Software Defined Data Centers - June 2012
Software Defined Data Centers - June 2012
 
Core Scheduling for Virtualization: Where are We? (If we Want it!)
Core Scheduling for Virtualization: Where are We? (If we Want it!)Core Scheduling for Virtualization: Where are We? (If we Want it!)
Core Scheduling for Virtualization: Where are We? (If we Want it!)
 
R intro
R introR intro
R intro
 
ISAC-Projects
ISAC-ProjectsISAC-Projects
ISAC-Projects
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
 
MARC ONERA Toulouse2012 Altreonic
MARC ONERA Toulouse2012 AltreonicMARC ONERA Toulouse2012 Altreonic
MARC ONERA Toulouse2012 Altreonic
 
The trials and tribulations of providing engineering infrastructure
 The trials and tribulations of providing engineering infrastructure  The trials and tribulations of providing engineering infrastructure
The trials and tribulations of providing engineering infrastructure
 
Mykhailo Zarai "Be careful when dealing with C++" at Rivne IT Talks
Mykhailo Zarai "Be careful when dealing with C++" at Rivne IT TalksMykhailo Zarai "Be careful when dealing with C++" at Rivne IT Talks
Mykhailo Zarai "Be careful when dealing with C++" at Rivne IT Talks
 

Último

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 

Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments

  • 1. Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments Nicolae Paladi1*, Christian Gehrmann1, Mudassar Aslam1, Fredric Morenius2 1 Swedish Institute of Computer Science 2 Ericsson Research
  • 2. 2 Contents 1. Infrastructure-as-a-Service 2. Problem Setting 3. Attacker Model 4. Related Work 5. Protocol Description 6. Protocol Implementation 7. Conclusion - u re ct ru - st a fra as- vice In r Se
  • 3. 3 Infrastructure-as-a-Service • A 'cloud computing' service model (NIST:2011):  Provision processing, storage, networks.  Deploy and run arbitrary software  No control over underlying cloud infrastructure  Control over OS, storage, deployed applications.  Limited control of select networking components. rio e na d s Sc an tion i in def
  • 4. 4 Scenario and Definitions Scheduler (S) Compute Compute Compute Host Host Host (CH) (CH) (CH) Hardware Hardware Hardware Client (C) f rie te B o M N TP on
  • 5. 5 A Brief Note on TPM • Trusted platform module v1.2 as specified by TCG • v2.0 is currently under review • Tamper-evident • 16+ PCRs as volatile or non-volatile storage Four operations: Signing / Binding / Sealing / Sealed-sign em o bl ng Pr etti S
  • 6. 6 Problem Setting • “Consumer is able to deploy and run arbitrary software, which can include operating systems and applications.” • Client can launch VMs for sensitive computations. • Trusted VM launch – the correct VM is launched in a IaaS platform on a host with a known software stack verified to not have been modified by malicious actors. • How do we ensure a trusted VM launch in an untrusted IaaS environment? er ta c k el At od M
  • 7. 7 Attacker Model • (Ar) has root access to IaaS hosts. • (Ar) has no physical access. • (Ar) has no access to CH's memory. • (Ar) can act maliciously or in good faith. ck tta ario A n e Sc 1 • (A ) can be a person/malicious software/code bug.
  • 8. 8 Attack scenario 1 Remote Attacker Scheduler Ar (S) Trusted Compute Compute Host Host (CH) (CH) Hardware Hardware Hardware Client (C) ck tta ario A n e Sc 2
  • 9. 9 Attack scenario 2 Remote Attacker Ar Compute Compute Host Host (CH) (CH) Hardware Hardware Hardware Client (C) ed lat rk Re o W
  • 10. 10 Related Work d u ste d Tr hir ty T ar P
  • 11. 11 Trusted VM Launch Protocol: Trusted Third Party • Trusted Third Party (TTP) – trusted by C and IaaS, able to assess the SP of CH according to predefined guidelines. • Security profile (SP) – verified setup of an VM, trusted by the Participants. • Currently no fine-grained scale of SP available. • Limited to only matching the measurements with reference values. g Bi e e r Th ictu P
  • 12. The big picture 3. (S) 1. 4. 5. 2. CH CH CH 6. HW HW HW + TPM l Client (C) c o ion to t ro crip P s 1) e ( D
  • 13. 13 Trusted VM Launch Protocol: Protocol Details (1) l c o ion to t ro crip P s 2) e ( D
  • 14. 14 Trusted VM Launch Protocol: Protocol Details (2) l co ion to t ro rip P sc 3) e ( D
  • 15. 15 Trusted VM Launch Protocol: Protocol Details (3) l c o ion to t ro crip P s 4) e ( D
  • 16. 16 Trusted VM Launch Protocol: Protocol Details (4) k S tac n pe O
  • 17. 18 Trusted VM Launch Protocol: OpenStack • Protocol was implemented in OpenStack • Open Source IaaS deployment and management platform. • Large user base and multiple industry contributors • “Essex” release as baseline. • Aimed to have a minimal footprint in terms of code modifications. • Implementation changed 4 components involved in the launch process (presented next). l n co atio to t r o en P m ) e pl (1 Im
  • 18. 19 Trusted VM Launch Protocol: Protocol Implementation (1) Affected components: • Nova SQL db – global security profile per compute host. • Dashboard – request compute host attestation, minimum SP, TTP’s URL and Token upload. • Scheduler – SimpleScheduler to schedule VM launches on trusted CH with the requested–or stricter–SP. • Nova compute – support communication with TPM through TSS, encryption/decryption and VM image integrity assessment. l n co tatio to ro en P e m 2) pl ( Im
  • 19. 20 Trusted VM Launch Protocol: Protocol Implementation (2) • TrustedComputingPools (currently in blueprints) will introduce TPM support in OpenStack • Trusted IaaS provider with untrusted nodes. • Node attestation offered as “premium service”. • Node attestation performed by IaaS provider itself. n u si o n cl Co
  • 20. 21 Conclusion • A trusted VM launch protocol available assuming an untrusted IaaS platform + TPM + physical security of the hosts. • Fairly close to ongoing industrial implementation but offers stricter security guarantees. • Fine-grained attestation process on the TTP side still a research challenge.